Description
The PGObject::Util::DBAdmin module before 0.120.0 for Perl, as used in LedgerSMB through 1.5.x, insufficiently sanitizes or escapes variable values used as part of shell command execution, resulting in shell code injection via the create(), run_file(), backup(), or restore() function. The vulnerability allows unauthorized users to execute code with the same privileges as the running application.
Published: 2018-06-08
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-20840 The PGObject::Util::DBAdmin module before 0.120.0 for Perl, as used in LedgerSMB through 1.5.x, insufficiently sanitizes or escapes variable values used as part of shell command execution, resulting in shell code injection via the create(), run_file(), backup(), or restore() function. The vulnerability allows unauthorized users to execute code with the same privileges as the running application.
History

No history.

Subscriptions

Ledgersmb Ledgersmb
Pgobject-util-dbadmin Project Pgobject-util-dbadmin
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-05T07:17:51.955Z

Reserved: 2018-04-03T00:00:00.000Z

Link: CVE-2018-9246

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2018-06-08T01:29:02.170

Modified: 2024-11-21T04:15:12.490

Link: CVE-2018-9246

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses